Bridges with no DirPort failing?

SiNA sina at anarchy.cx
Tue Feb 8 17:02:48 UTC 2011


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello,

Please note that I erased my ~/.tor directory before running Tor client,
to generate this error:

Tor Client Config:
====================
AutomapHostsOnResolve 1
SafeLogging 0
#DNSListenAddress 127.0.0.1
#DNSPort 53
ExcludeNodes {US}
# Log debug file /var/log/tor/debug.log
TransListenAddress 127.0.0.1
TransPort 9040

UseBridges 1
TunnelDirConns 1
Bridge 50.7.249.43:993



Tor Client Log:
===============
Feb 08 08:58:34.953 [Notice] Tor v0.2.2.22-alpha (git-21b3de6cf37d4e60).
This is experimental software. Do not rely on it for strong anonymity.
(Running on Linux i686)
Feb 08 08:58:34.954 [Notice] Initialized libevent version 1.4.13-stable
using method epoll. Good.
Feb 08 08:58:34.955 [Notice] Opening Socks listener on 127.0.0.1:9050
Feb 08 08:58:34.955 [Notice] Opening Transparent pf/netfilter listener
on 127.0.0.1:9040
Feb 08 08:58:34.955 [Notice] Opening Control listener on 127.0.0.1:9051
Feb 08 08:58:34.956 [Warning] Fixing permissions on directory
/home/architect/.tor
Feb 08 08:58:34.956 [Notice] Parsing GEOIP file /usr/share/tor/geoip.
Feb 08 08:58:37.873 [Debug] conn_read_callback(): socket 10 wants to read.
Feb 08 08:58:37.874 [Debug] conn_read_callback(): socket 10 wants to read.
Feb 08 08:58:37.874 [Debug] conn_read_callback(): socket 10 wants to read.
Feb 08 08:58:38.094 [Debug] conn_write_callback(): socket 11 wants to write.
Feb 08 08:58:38.095 [Debug] connection_or_finished_connecting(): OR
connect() to router at 50.7.249.43:993 finished.
Feb 08 08:58:38.095 [Notice] Bootstrapped 10%: Finishing handshake with
directory server.
Feb 08 08:58:38.099 [Debug] rectify_client_ciphers(): List was:
ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:ECDH-RSA-AES256-SHA:ECDH-ECDSA-AES256-SHA:AES256-SHA:ECDHE-ECDSA-RC4-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-RC4-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA:ECDH-RSA-RC4-SHA:ECDH-RSA-AES128-SHA:ECDH-ECDSA-RC4-SHA:ECDH-ECDSA-AES128-SHA:RC4-MD5:RC4-SHA:AES128-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:EDH-DSS-DES-CBC3-SHA:ECDH-RSA-DES-CBC3-SHA:ECDH-ECDSA-DES-CBC3-SHA:DES-CBC3-SHA:
Feb 08 08:58:38.100 [Debug] rectify_client_ciphers(): Cipher 0: 300c00a
ECDHE-ECDSA-AES256-SHA
Feb 08 08:58:38.101 [Debug] rectify_client_ciphers(): Cipher 1: 300c014
ECDHE-RSA-AES256-SHA
Feb 08 08:58:38.101 [Debug] rectify_client_ciphers(): Cipher 2: 3000039
DHE-RSA-AES256-SHA
Feb 08 08:58:38.103 [Debug] rectify_client_ciphers(): Cipher 3: 3000038
DHE-DSS-AES256-SHA
Feb 08 08:58:38.103 [Debug] rectify_client_ciphers(): Cipher 4: 300c00f
ECDH-RSA-AES256-SHA
Feb 08 08:58:38.104 [Debug] rectify_client_ciphers(): Cipher 5: 300c005
ECDH-ECDSA-AES256-SHA
Feb 08 08:58:38.104 [Debug] rectify_client_ciphers(): Cipher 6: 3000035
AES256-SHA
Feb 08 08:58:38.105 [Debug] rectify_client_ciphers(): Cipher 7: 300c007
ECDHE-ECDSA-RC4-SHA
Feb 08 08:58:38.105 [Debug] rectify_client_ciphers(): Cipher 8: 300c009
ECDHE-ECDSA-AES128-SHA
Feb 08 08:58:38.106 [Debug] rectify_client_ciphers(): Cipher 9: 300c011
ECDHE-RSA-RC4-SHA
Feb 08 08:58:38.106 [Debug] rectify_client_ciphers(): Cipher 10: 300c013
ECDHE-RSA-AES128-SHA
Feb 08 08:58:38.107 [Debug] rectify_client_ciphers(): Cipher 11: 3000033
DHE-RSA-AES128-SHA
Feb 08 08:58:38.107 [Debug] rectify_client_ciphers(): Cipher 12: 3000032
DHE-DSS-AES128-SHA
Feb 08 08:58:38.108 [Debug] rectify_client_ciphers(): Cipher 13: 300c00c
ECDH-RSA-RC4-SHA
Feb 08 08:58:38.108 [Debug] rectify_client_ciphers(): Cipher 14: 300c00e
ECDH-RSA-AES128-SHA
Feb 08 08:58:38.109 [Debug] rectify_client_ciphers(): Cipher 15: 300c002
ECDH-ECDSA-RC4-SHA
Feb 08 08:58:38.109 [Debug] rectify_client_ciphers(): Cipher 16: 300c004
ECDH-ECDSA-AES128-SHA
Feb 08 08:58:38.110 [Debug] rectify_client_ciphers(): Cipher 17: 3000004
RC4-MD5
Feb 08 08:58:38.110 [Debug] rectify_client_ciphers(): Cipher 18: 2010080
RC4-MD5
Feb 08 08:58:38.110 [Debug] rectify_client_ciphers(): Cipher 19: 3000005
RC4-SHA
Feb 08 08:58:38.111 [Debug] rectify_client_ciphers(): Cipher 20: 300002f
AES128-SHA
Feb 08 08:58:38.111 [Debug] rectify_client_ciphers(): Cipher 21: 300c008
ECDHE-ECDSA-DES-CBC3-SHA
Feb 08 08:58:38.112 [Debug] rectify_client_ciphers(): Cipher 22: 300c012
ECDHE-RSA-DES-CBC3-SHA
Feb 08 08:58:38.112 [Debug] rectify_client_ciphers(): Cipher 23: 3000016
EDH-RSA-DES-CBC3-SHA
Feb 08 08:58:38.113 [Debug] rectify_client_ciphers(): Cipher 24: 3000013
EDH-DSS-DES-CBC3-SHA
Feb 08 08:58:38.113 [Debug] rectify_client_ciphers(): Cipher 25: 300c00d
ECDH-RSA-DES-CBC3-SHA
Feb 08 08:58:38.114 [Debug] rectify_client_ciphers(): Cipher 26: 300c003
ECDH-ECDSA-DES-CBC3-SHA
Feb 08 08:58:38.114 [Debug] rectify_client_ciphers(): Cipher 27: 300000a
DES-CBC3-SHA
Feb 08 08:58:38.115 [Debug] rectify_client_ciphers(): Found cipher
ECDHE-ECDSA-AES256-SHA
Feb 08 08:58:38.115 [Debug] rectify_client_ciphers(): Found cipher
ECDHE-RSA-AES256-SHA
Feb 08 08:58:38.116 [Debug] rectify_client_ciphers(): Found cipher
DHE-RSA-AES256-SHA
Feb 08 08:58:38.116 [Debug] rectify_client_ciphers(): Found cipher
DHE-DSS-AES256-SHA
Feb 08 08:58:38.116 [Debug] rectify_client_ciphers(): Found cipher
ECDH-RSA-AES256-SHA
Feb 08 08:58:38.117 [Debug] rectify_client_ciphers(): Found cipher
ECDH-ECDSA-AES256-SHA
Feb 08 08:58:38.118 [Debug] rectify_client_ciphers(): Found cipher
AES256-SHA
Feb 08 08:58:38.118 [Debug] rectify_client_ciphers(): Found cipher
ECDHE-ECDSA-RC4-SHA
Feb 08 08:58:38.119 [Debug] rectify_client_ciphers(): Found cipher
ECDHE-ECDSA-AES128-SHA
Feb 08 08:58:38.119 [Debug] rectify_client_ciphers(): Found cipher
ECDHE-RSA-RC4-SHA
Feb 08 08:58:38.120 [Debug] rectify_client_ciphers(): Found cipher
ECDHE-RSA-AES128-SHA
Feb 08 08:58:38.121 [Debug] rectify_client_ciphers(): Found cipher
DHE-RSA-AES128-SHA
Feb 08 08:58:38.121 [Debug] rectify_client_ciphers(): Found cipher
DHE-DSS-AES128-SHA
Feb 08 08:58:38.122 [Debug] rectify_client_ciphers(): Found cipher
ECDH-RSA-RC4-SHA
Feb 08 08:58:38.122 [Debug] rectify_client_ciphers(): Found cipher
ECDH-RSA-AES128-SHA
Feb 08 08:58:38.123 [Debug] rectify_client_ciphers(): Found cipher
ECDH-ECDSA-RC4-SHA
Feb 08 08:58:38.124 [Debug] rectify_client_ciphers(): Found cipher
ECDH-ECDSA-AES128-SHA
Feb 08 08:58:38.124 [Debug] rectify_client_ciphers(): Found cipher RC4-MD5
Feb 08 08:58:38.124 [Debug] rectify_client_ciphers(): Skipping v2 cipher
RC4-MD5
Feb 08 08:58:38.125 [Debug] rectify_client_ciphers(): Found cipher RC4-SHA
Feb 08 08:58:38.125 [Debug] rectify_client_ciphers(): Found cipher
AES128-SHA
Feb 08 08:58:38.125 [Debug] rectify_client_ciphers(): Found cipher
ECDHE-ECDSA-DES-CBC3-SHA
Feb 08 08:58:38.126 [Debug] rectify_client_ciphers(): Found cipher
ECDHE-RSA-DES-CBC3-SHA
Feb 08 08:58:38.126 [Debug] rectify_client_ciphers(): Found cipher
EDH-RSA-DES-CBC3-SHA
Feb 08 08:58:38.126 [Debug] rectify_client_ciphers(): Found cipher
EDH-DSS-DES-CBC3-SHA
Feb 08 08:58:38.127 [Debug] rectify_client_ciphers(): Found cipher
ECDH-RSA-DES-CBC3-SHA
Feb 08 08:58:38.127 [Debug] rectify_client_ciphers(): Found cipher
ECDH-ECDSA-DES-CBC3-SHA
Feb 08 08:58:38.127 [Debug] rectify_client_ciphers(): Inserting fake
SSL3_TXT_RSA_FIPS_WITH_3DES_EDE_CBC_SHA
Feb 08 08:58:38.128 [Debug] rectify_client_ciphers(): Found cipher
DES-CBC3-SHA
Feb 08 08:58:38.128 [Debug] connection_tls_start_handshake(): starting
TLS handshake on fd 11
Feb 08 08:58:38.128 [Debug] tor_tls_handshake(): About to call
SSL_connect on 0x20be9d30 (Unknown state 24576)
Feb 08 08:58:38.129 [Debug] tor_tls_handshake(): After call, 0x20be9d30
was in state SSL23_ST_CR_SRVR_HELLO_A
Feb 08 08:58:38.129 [Debug] connection_tls_continue_handshake(): wanted read
Feb 08 08:58:38.129 [Debug] tor_tls_handshake(): About to call
SSL_connect on 0x20be9d30 (SSL23_ST_CR_SRVR_HELLO_A)
Feb 08 08:58:38.130 [Debug] connection_tls_continue_handshake(): wanted read
Feb 08 08:58:38.417 [Debug] conn_read_callback(): socket 11 wants to read.
Feb 08 08:58:38.417 [Debug] tor_tls_handshake(): About to call
SSL_connect on 0x20be9d30 (SSL23_ST_CR_SRVR_HELLO_A)
Feb 08 08:58:38.418 [Debug] tor_tls_handshake(): After call, 0x20be9d30
was in state SSL3_ST_CR_SESSION_TICKET_A
Feb 08 08:58:38.418 [Debug] connection_tls_continue_handshake(): wanted read
Feb 08 08:58:38.646 [Debug] conn_read_callback(): socket 11 wants to read.
Feb 08 08:58:38.646 [Debug] tor_tls_handshake(): About to call
SSL_connect on 0x20be9d30 (SSL3_ST_CR_SESSION_TICKET_A)
Feb 08 08:58:38.647 [Debug] tor_tls_handshake(): After call, 0x20be9d30
was in state SSL_ST_OK
Feb 08 08:58:38.647 [Debug] tor_tls_handshake(): Server sent back a
single certificate; looks like a v2 handshake on 0x20be9d30.
Feb 08 08:58:38.648 [Debug] connection_tls_continue_handshake(): wanted read
Feb 08 08:58:38.987 [Debug] conn_read_callback(): socket 11 wants to read.
Feb 08 08:58:38.987 [Debug] connection_tls_continue_handshake(): wanted read
Feb 08 08:58:39.227 [Debug] conn_read_callback(): socket 11 wants to read.
Feb 08 08:58:39.228 [Debug] connection_tls_finish_handshake(): tls
handshake with 50.7.249.43 done. verifying.
Feb 08 08:58:39.229 [Debug] connection_or_check_valid_tls_handshake():
The certificate seems to be valid on outgoing connection with
50.7.249.43:993
Feb 08 08:58:39.229 [Info] connection_or_check_valid_tls_handshake():
Connected to router $956B9E3D11C26F77B8EC878ECC7C830A543867D2 at
50.7.249.43:993 without knowing its key. Hoping for the best.
Feb 08 08:58:39.230 [Notice] Learned fingerprint
956B9E3D11C26F77B8EC878ECC7C830A543867D2 for bridge 50.7.249.43:993
Feb 08 08:58:39.231 [Debug] connection_or_process_cells_from_inbuf():
11: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 08 08:58:39.232 [Debug] conn_write_callback(): socket 11 wants to write.
Feb 08 08:58:39.233 [Debug] flush_chunk_tls(): flushed 9 bytes, 0 ready
to flush, 0 remain.
Feb 08 08:58:39.233 [Debug] connection_handle_write_impl(): After TLS
write of 9: 3508 read, 1902 written
Feb 08 08:58:39.459 [Debug] conn_read_callback(): socket 11 wants to read.
Feb 08 08:58:39.460 [Debug] connection_read_to_buf(): 11: starting,
inbuf_datalen 0 (0 pending in tls object). at_most 16384.
Feb 08 08:58:39.462 [Debug] connection_read_to_buf(): After TLS read of
521: 586 read, 0 written
Feb 08 08:58:39.462 [Debug] connection_or_process_cells_from_inbuf():
11: starting, inbuf_datalen 521 (0 pending in tls object).
Feb 08 08:58:39.463 [Info] command_process_versions_cell(): Negotiated
version 2 with 50.7.249.43:993; sending NETINFO.
Feb 08 08:58:39.463 [Debug] connection_or_process_cells_from_inbuf():
11: starting, inbuf_datalen 512 (0 pending in tls object).
Feb 08 08:58:39.464 [Debug] circuit_n_conn_done(): or_conn to
$956B9E3D11C26F77B8EC878ECC7C830A543867D2/50.7.249.43, status=1
Feb 08 08:58:39.465 [Debug] circuit_n_conn_done(): Found circ, sending
create cell.
Feb 08 08:58:39.465 [Debug] circuit_send_next_onion_skin(): First skin;
sending create cell.
Feb 08 08:58:39.466 [Notice] Bootstrapped 15%: Establishing an encrypted
directory connection.
Feb 08 08:58:39.468 [Debug] circuit_deliver_create_cell(): Chosen circID
49970.
Feb 08 08:58:39.469 [Debug] append_cell_to_circuit_queue(): Made a
circuit active.
Feb 08 08:58:39.470 [Info] circuit_send_next_onion_skin(): First hop:
finished sending CREATE_FAST cell to '<unnamed>'
Feb 08 08:58:39.471 [Info] command_process_netinfo_cell(): Got good
NETINFO cell from 50.7.249.43:993; OR connection is now open, using
protocol version 2
Feb 08 08:58:39.471 [Debug] connection_or_process_cells_from_inbuf():
11: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 08 08:58:39.471 [Debug] conn_write_callback(): socket 11 wants to write.
Feb 08 08:58:39.472 [Debug] flush_chunk_tls(): flushed 512 bytes, 0
ready to flush, 0 remain.
Feb 08 08:58:39.472 [Debug] connection_handle_write_impl(): After TLS
write of 512: 0 read, 586 written
Feb 08 08:58:39.473 [Debug]
connection_or_flush_from_first_active_circuit(): Made a circuit inactive.
Feb 08 08:58:39.473 [Debug] conn_write_callback(): socket 11 wants to write.
Feb 08 08:58:39.473 [Debug] flush_chunk_tls(): flushed 512 bytes, 0
ready to flush, 0 remain.
Feb 08 08:58:39.474 [Debug] connection_handle_write_impl(): After TLS
write of 512: 0 read, 586 written
Feb 08 08:58:39.926 [Debug] global_read_bucket now 10485760.
Feb 08 08:58:39.933 [Debug] global_write_bucket now 10485760.
Feb 08 08:58:39.933 [Debug] global_relayed_read_bucket now 10485760.
Feb 08 08:58:39.934 [Debug] global_relayed_write_bucket now 10485760.
Feb 08 08:58:39.934 [Debug] or_conn->write_bucket now 10485760.
Feb 08 08:58:39.990 [Debug] conn_read_callback(): socket 11 wants to read.
Feb 08 08:58:39.995 [Debug] connection_read_to_buf(): 11: starting,
inbuf_datalen 0 (0 pending in tls object). at_most 16384.
Feb 08 08:58:39.996 [Debug] connection_read_to_buf(): After TLS read of
512: 586 read, 0 written
Feb 08 08:58:39.996 [Debug] connection_or_process_cells_from_inbuf():
11: starting, inbuf_datalen 512 (0 pending in tls object).
Feb 08 08:58:39.997 [Debug] command_process_created_cell(): at OP.
Finishing handshake.
Feb 08 08:58:39.997 [Info] circuit_finish_handshake(): Finished building
fast circuit hop:
Feb 08 08:58:39.998 [Info] exit circ (length 1, exit
0000000000000000000000000000000000000000):
$0000000000000000000000000000000000000000(open)
Feb 08 08:58:39.998 [Debug] command_process_created_cell(): Moving to
next skin.
Feb 08 08:58:39.998 [Debug] circuit_send_next_onion_skin(): starting to
send subsequent skin.
Feb 08 08:58:39.999 [Info] circuit_send_next_onion_skin(): circuit built!
Feb 08 08:58:39.999 [Notice] Bootstrapped 20%: Asking for networkstatus
consensus.
Feb 08 08:58:40.001 [Debug] connection_ap_handshake_attach_circuit():
Attaching apconn to circ 49970 (stream 2 sec old).
Feb 08 08:58:40.002 [Info] exit circ (length 1):
$0000000000000000000000000000000000000000(open)
Feb 08 08:58:40.003 [Debug] link_apconn_to_circ(): attaching new conn to
circ. n_circ_id 49970.
Feb 08 08:58:40.004 [Debug] connection_ap_handshake_send_begin():
Sending relay cell to begin stream 16864.
Feb 08 08:58:40.005 [Debug] relay_send_command_from_edge(): delivering
13 cell forward.
Feb 08 08:58:40.005 [Debug] circuit_package_relay_cell(): crypting a
layer of the relay cell.
Feb 08 08:58:40.006 [Debug] append_cell_to_circuit_queue(): Made a
circuit active.
Feb 08 08:58:40.006 [Debug] append_cell_to_circuit_queue(): Primed a buffer.
Feb 08 08:58:40.007 [Debug]
connection_or_flush_from_first_active_circuit(): Made a circuit inactive.
Feb 08 08:58:40.007 [Info] connection_ap_handshake_send_begin():
Address/port sent, ap socket -1, n_circ_id 49970
Feb 08 08:58:40.008 [Debug] connection_or_process_cells_from_inbuf():
11: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 08 08:58:40.008 [Debug] conn_write_callback(): socket 11 wants to write.
Feb 08 08:58:40.009 [Debug] flush_chunk_tls(): flushed 512 bytes, 0
ready to flush, 0 remain.
Feb 08 08:58:40.009 [Debug] connection_handle_write_impl(): After TLS
write of 512: 0 read, 586 written
Feb 08 08:58:40.194 [Debug] conn_read_callback(): socket 11 wants to read.
Feb 08 08:58:40.197 [Debug] connection_read_to_buf(): 11: starting,
inbuf_datalen 0 (0 pending in tls object). at_most 16384.
Feb 08 08:58:40.198 [Debug] connection_read_to_buf(): After TLS read of
512: 586 read, 0 written
Feb 08 08:58:40.198 [Debug] connection_or_process_cells_from_inbuf():
11: starting, inbuf_datalen 512 (0 pending in tls object).
Feb 08 08:58:40.199 [Debug] relay_lookup_conn(): found conn for stream
16864.
Feb 08 08:58:40.199 [Debug] circuit_receive_relay_cell(): Sending to origin.
Feb 08 08:58:40.200 [Debug] connection_edge_process_relay_cell(): Now
seen 1 relay cells here (command 3, stream 16864).
Feb 08 08:58:40.200 [Info] connection_ap_process_end_not_open(): Edge
got end (not a directory) before we're connected. Marking for close.
Feb 08 08:58:40.200 [Info] exit circ (length 1):
$0000000000000000000000000000000000000000(open)
Feb 08 08:58:40.201 [Info] stream_end_reason_to_socks5_response():
Reason for ending (526) not recognized; sending generic socks error.
Feb 08 08:58:40.202 [Debug] connection_or_process_cells_from_inbuf():
11: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 08 08:58:40.202 [Debug] conn_close_if_marked(): Cleaning up
connection (fd -1).
Feb 08 08:58:40.203 [Debug] connection_remove(): removing socket -1
(type Socks), n_conns now 7
Feb 08 08:58:40.203 [Info] _connection_free(): Freeing linked Socks
connection [waiting for connect response] with 63 bytes on inbuf, 0 on
outbuf.
Feb 08 08:58:40.204 [Debug] conn_read_callback(): socket -1 wants to read.
Feb 08 08:58:40.204 [Info] connection_dir_client_reached_eof(): 'fetch'
response not all here, but we're at eof. Closing.
Feb 08 08:58:40.205 [Debug] conn_close_if_marked(): Cleaning up
connection (fd -1).
Feb 08 08:58:40.205 [Info] connection_dir_request_failed(): Giving up on
directory server at '50.7.249.43'; retrying
Feb 08 08:58:40.205 [Debug] connection_remove(): removing socket -1
(type Directory), n_conns now 6
Feb 08 08:58:40.206 [Info] _connection_free(): Freeing linked Directory
connection [client reading] with 0 bytes on inbuf, 0 on outbuf.
Feb 08 08:58:40.866 [Debug] global_read_bucket now 10485760.
Feb 08 08:58:40.868 [Debug] global_write_bucket now 10485760.
Feb 08 08:58:40.870 [Debug] or_conn->read_bucket now 10485760.
Feb 08 08:58:40.871 [Debug] or_conn->write_bucket now 10485760.
Feb 08 08:58:48.882 [Info] smartlist_choose_by_bandwidth_weights():
Empty routerlist passed in to consensus weight node selection for rule
weight as guard
Feb 08 08:58:48.883 [Info] smartlist_choose_by_bandwidth(): Empty
routerlist passed in to old node selection for rule weight as guard
Feb 08 08:58:48.884 [Info] should_delay_dir_fetches(): delaying dir
fetches (no running bridges known)
Feb 08 08:58:59.921 [Info] smartlist_choose_by_bandwidth_weights():
Empty routerlist passed in to consensus weight node selection for rule
weight as guard
Feb 08 08:58:59.923 [Info] smartlist_choose_by_bandwidth(): Empty
routerlist passed in to old node selection for rule weight as guard
Feb 08 08:58:59.925 [Info] should_delay_dir_fetches(): delaying dir
fetches (no running bridges known)
Feb 08 08:59:10.954 [Info] smartlist_choose_by_bandwidth_weights():
Empty routerlist passed in to consensus weight node selection for rule
weight as guard
Feb 08 08:59:10.956 [Info] smartlist_choose_by_bandwidth(): Empty
routerlist passed in to old node selection for rule weight as guard
Feb 08 08:59:10.956 [Info] should_delay_dir_fetches(): delaying dir
fetches (no running bridges known)
Feb 08 08:59:21.990 [Info] smartlist_choose_by_bandwidth_weights():
Empty routerlist passed in to consensus weight node selection for rule
weight as guard
Feb 08 08:59:21.992 [Info] smartlist_choose_by_bandwidth(): Empty
routerlist passed in to old node selection for rule weight as guard
Feb 08 08:59:21.992 [Info] should_delay_dir_fetches(): delaying dir
fetches (no running bridges known)
Feb 08 08:59:32.017 [Info] smartlist_choose_by_bandwidth_weights():
Empty routerlist passed in to consensus weight node selection for rule
weight as guard
Feb 08 08:59:32.019 [Info] smartlist_choose_by_bandwidth(): Empty
routerlist passed in to old node selection for rule weight as guard
Feb 08 08:59:32.019 [Info] should_delay_dir_fetches(): delaying dir
fetches (no running bridges known)
Feb 08 08:59:38.034 [Info] smartlist_choose_by_bandwidth_weights():
Empty routerlist passed in to consensus weight node selection for rule
weight as guard
Feb 08 08:59:38.036 [Info] smartlist_choose_by_bandwidth(): Empty
routerlist passed in to old node selection for rule weight as guard
Feb 08 08:59:38.037 [Info] should_delay_dir_fetches(): delaying dir
fetches (no running bridges known)
Feb 08 08:59:42.520 [Debug] conn_read_callback(): socket 10 wants to read.
Feb 08 08:59:42.541 [Debug] conn_read_callback(): socket 10 wants to read.


- --
SiNA
pgp 0x0B47D56D

On 02/08/2011 02:58 AM, Roger Dingledine wrote:
> SafeLogging 0
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQIcBAEBAgAGBQJNUXcwAAoJEJPBwXYLR9Vt6lcP/0h0B8WA2PAYjBqw1gev9krm
dNc5wWyrwB7O5HEr5whAdPQ5HOuE3kYqzQ7SgULJoWajwNncjRfgVTCsnJqsAMLW
cs+r8uvadzYWxCrWk/23qdIQp9yA8dVlQKNSfdyYgDG/8l1DiEV/DS/XsAW7QgFx
D+h4W1s6uML3U9Mi0nt7922hm1G6cScBZ+dokuwOXZrodQvVQ5JJuadBYp011GjD
aAjqyXf5J8YvZld8Z8HWQwqeUsxJzIwgerKdid6A8G7fBrJvebLSAy/OA0wIK0tF
OYkJ/JZ/R/CjHbvCzd5efcj0yHhHpOeMF9R79MZO9FGVPuyzeKwiy/l9YsqIfggk
j25nRPdCXbFxU4GdyUVYI6adbF0QOc2Yqjq+ptqyUyRYhwS88rXwUATrBNa7uYwm
PH6h1H134551lnhAmhT/V1D5qLr94kQyUrT234LOtrQJF97bQ/L+k094BQx+9kU1
kfKoIF56njsMENwfwBOlJEeUzZ7y2ghB/gKUQBA8jMe4Lw0qY7HKWGtcHuR3Wxr7
hOifaASzwFhdFA3bxvoIKRhTV+d9+RVcmASRt9hdDsd3ZE5AC6RYbGTqQ5UsAXHV
Ia7fuGWk4MhLLUS48BsqulSnh3hluKyJnXbp6f4psySAj+5guWEzQN/03vwf5giu
qWxfbhkCJ8/UVNssp6f9
=eU28
-----END PGP SIGNATURE-----



More information about the tor-dev mailing list